Common use of Network Access Control Clause in Contracts

Network Access Control. A computer referred to as a “firewall” is located between the Internet backbone connection and the Internet accessible application hosting equipment (“web servers”). The purpose of the firewall is to control the connectivity to the web servers at the port level. This equipment is located in a secure and environmentally controlled data center. Changes to the configuration of this computer are administered by authorized ALPS’s IT staff. This equipment will not interrogate data, and its only function is to limit the type of traffic accessing the web servers to the suite of hyper-text transfer protocols (“HTTP”) transmissions. Ports on the router are configured to be consistent with ports on the web servers. All other ports on the router other than those configured for the web servers are not accessible from the Internet. The web servers utilize adequate and appropriate software and hardware. All services and functions within the web servers’ operating system are deactivated with the exception of services and functions which support AVA. The general purpose of this feature is to prevent external users from entering commands or running processes on the web servers. All ports on the web servers, except those required by AVA, are disabled. Directory structures are “hidden” from the user. Services that provide directory information are also deactivated. ALPS’s administrators gain access to the web servers through a directly connected physical console or through the internal network via ALPS Secure ID. AVA is programmed to terminate the session/transaction between the shareholder and the application if data authentication fails. All successful and unsuccessful sessions are logged.

Appears in 28 contracts

Samples: Transfer Agency and Services Agreement (ALPS Series Trust), Transfer Agency and Services Agreement (USCF Mutual Funds Trust), Transfer Agency and Services Agreement (Bridge Builder Trust)

AutoNDA by SimpleDocs

Network Access Control. A computer referred to as a “firewall” is located between the Internet backbone connection and the Internet accessible application hosting equipment (“web servers”). The purpose of the firewall is to control the connectivity to the web servers at the port level. This equipment is located in a secure and environmentally controlled data center. Changes to the configuration of this computer are administered by authorized ALPS’s IT staff. This equipment will not interrogate data, and its only function is to limit the type of traffic accessing the web servers to the suite of hyper-text transfer protocols (“HTTP”) transmissions. Ports on the router are configured to be consistent with ports on the web servers. All other ports on the router other than those configured for the web servers are not accessible from the Internet. The web servers utilize adequate and appropriate software and hardware. All services and functions within the web servers’ operating system are deactivated with the exception of services and functions which support AVA. The general purpose of this feature is to prevent external users from entering commands or running processes on the web servers. All ports on the web servers, except those required by AVA, are disabled. Directory structures are “hidden” from the user. Services that provide directory information are also deactivated. ALPS’s administrators gain access to the web servers through a directly connected physical console or through the internal network via ALPS Secure ID. AVA is programmed to terminate the session/transaction between the shareholder and the application if data authentication fails. All successful and unsuccessful sessions are logged.

Appears in 10 contracts

Samples: Transfer Agency and Services Agreement (Stadion Investment Trust), Transfer Agency and Services Agreement (Stadion Investment Trust), Transfer Agency and Services Agreement (ALPS Series Trust)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.